Conference
|
2022 |
Network Detection of Fake Base Station using Automatic Neighbour Relation in Self-Organizing Networks
Shin Ji Soo International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.968-970 |
4 |
원문
|
Journal
|
2021 |
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools
Song-Yi Hwang Sensors, v.21, no.21, pp.1-23 |
8 |
원문
|
Conference
|
2021 |
Behind Block Explorers: Public Blockchain Measurement and Security Implication
Heo Hwanjo International Conference on Distributed Computing Systems (ICDCS) 2021, pp.216-226 |
5 |
원문
|
Conference
|
2020 |
Proposal of Smart Segmentation Framework for preventing threats from spreading in IoT
Lim Jae Deok International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1757-1759 |
2 |
원문
|
Conference
|
2016 |
Practical Approaches to the DRDoS Attack Detection based on Netflow Analysis
Jung Tae Kim International Conference on Evolving Internet (INTERNET) 2016, pp.20-25 |
|
|
Conference
|
2015 |
Denial of Service Attack against IEEE 802.11 WLAN Fast Initial Link Setup Technology
Lee Sokjoon International Conference on Computer Engineering and Information Technology (ICCEIT) 2015, pp.335-337 |
|
|
Conference
|
2015 |
A Technique to Make a Path Table for Blocking Distributed Denial-of-Service Attacks
Eun Jee Sook International Conference on Future Generation Communication and Networking (FGCN) 2015, pp.13-16 |
1 |
원문
|
Conference
|
2015 |
A Design of Authentication Method Based on Magnetic Field Area Network
Juyoung Park International Conference on Convergence and its Application (ICCA) 2015, v.10, no.13, pp.33574-33576 |
0 |
|
Journal
|
2012 |
Multicore Flow Processor with Wire-Speed Flow Admission Control
Doo Kyeong Hwan ETRI Journal, v.34, no.6, pp.827-837 |
5 |
원문
|
Journal
|
2011 |
Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment
Abedelaziz Mohaisen KSII Transactions on Internet and Information Systems, v.5, no.9, pp.1684-1697 |
0 |
원문
|
Conference
|
2010 |
Control Method for the number of Checkpoint Nodes for Detecting Selective Forwarding Attacks in Wireless Sensor Networks
Lee Sang Jin International Conference on Information and Communication Technology Convergence (ICTC) 2010, pp.537-538 |
2 |
원문
|
Conference
|
2005 |
The Method of P2P Traffic Detecting for P2P Harmful Contents Prevention
Lee Ho Gyun International Conference on Advanced Communication Technology (ICACT) 2005, pp.777-780 |
|
원문
|
Conference
|
2003 |
MF (Minority First) scheme for defeating distributed denial of service attacks
An Gaeil International Symposium on Computers and Communications (ISCC) 2003, pp.1-6 |
7 |
원문
|